CN109815698A - Malware is determined using firmware - Google Patents

Malware is determined using firmware Download PDF

Info

Publication number
CN109815698A
CN109815698A CN201810035877.2A CN201810035877A CN109815698A CN 109815698 A CN109815698 A CN 109815698A CN 201810035877 A CN201810035877 A CN 201810035877A CN 109815698 A CN109815698 A CN 109815698A
Authority
CN
China
Prior art keywords
bmc
malware
equipment
instruction
calculating equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810035877.2A
Other languages
Chinese (zh)
Other versions
CN109815698B (en
Inventor
J·S·豪尔沙尼
苏哈斯·希万纳
路易斯·E·卢恰尼·吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Enterprise Development LP
Original Assignee
Hewlett Packard Enterprise Development LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development LP filed Critical Hewlett Packard Enterprise Development LP
Publication of CN109815698A publication Critical patent/CN109815698A/en
Application granted granted Critical
Publication of CN109815698B publication Critical patent/CN109815698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

Example disclosed herein is related to determining Malware using firmware, and in particular, to determines Malware using the firmware for calculating equipment.Firmware can be used to determine that the instruction that there is Malware on said computing device exists.In response to there is the instruction of Malware on said computing device, the firmware can be executed with movement with high safety.

Description

Malware is determined using firmware
Background technique
Service provider and manufacturer are challenged come for example by providing the access to computing capability to transmit to consumer Quality and value.Data center is for accommodating computer network, computer system and associated component (such as telecommunications and storage system System) facility.Equipment in data center can be mounted in the form of the server in cabinet.Data center may be malice The target of software (for example extorting software) attack.
Detailed description of the invention
Detailed description below refers to attached drawing, in which:
Fig. 1 is to be able to respond according to exemplary in determining the instruction for depositing Malware on the computing device and with high safety The block diagram of the calculating equipment of movement;
Fig. 2 is implemented including being able to respond in the determining instruction for depositing Malware on the computing device according to exemplary The block diagram of the computing system of the calculating equipment of safe action;
Fig. 3 is the flow chart of the method for movement with high safety according to the exemplary instruction in response to Malware;
Fig. 4 be according to it is exemplary include the substrate management control for being able to respond instruction in Malware and movement with high safety The block diagram of the calculating equipment of device processed;
Fig. 5 is to indicate to restore to start for extorting the firmware that software is present in system based on confirmation according to exemplary The flow chart of the method for journey;And
Fig. 6 is can to indicate to start in recovery process on a computing system based on the firmware for extorting software according to exemplary Entreat the block diagram of management system.
Throughout the drawings, identical appended drawing reference can specify similar but not necessarily identical element.It is attached to The index " N " of appended drawing reference can be understood as being merely representative of plural number, and for each attached drawing mark with such index " N " Note can not necessarily indicate identical amount.In addition, not no use (wherein such appended drawing reference of the appended drawing reference of index herein Quoted elsewhere with index) it can be (collectively or individually) the general reference to corresponding complex elements.Another In a example, index " I ", " M " etc. can be used to replace index N.
Specific embodiment
Entity can try to avoid security attack by identifying the loophole in its data center.Loophole may include possible It is utilized to invade lacking for the design of the network in data center of the security strategy of network, realization, operation and/or management aspect It falls into and/or weakness is (for example, it may be possible to right by the unwarranted access of the assets to entity, destruction, disclosure and/or modification The case where network has a negative impact and/or event).Using instruction code may include caused using loophole it is undesired and/or Computer-readable instruction, data and/or the command sequence for the behavior that do not expect.Security attack may include using and/or attempt Use the utilization instruction code for being directed to loophole.In order to avoid subsequent security attack, investigation is can be implemented (for example, electronics takes in entity Card investigation), what loophole anything to be used to utilize instruction code for during security attack to determine.
Based on threatening information and market intelligence, it will therefore be apparent that using Malware for operating system, firmware and hard The quantity of the attack of part layer has increased.For example, being set for extorting purpose and upsetting economy, national security and/or key foundation The Malware applied.With being easy to obtain Malware from dark network and extorting software vulnerability using kit, attack is continuous Change and becomes more complicated.
Some attacks, which are directed to, encrypts bootstrap block (for example, master boot record (MBR)) together with data, and nearest Attack causes confusion in many middle-size and small-size business and enterprise.As used herein, bootstrap block is set with by calculating The region of the associated storage equipment of the initial order that standby processor is read.In view of increased Malware and extort software, Advanced duration threat and Security Trend to hardware and firmware, detects these complicated attacks and pacifies from these attacks Restore entirely and automatically to be advantageous.Such automatic detection and recovery solution can be used for computing system user to have Help the peaceful Taiwan investment of its operating system (OSes) of fast quick-recovery to produce, and reduces recovery time.
As used herein, Malware is malicious software or intrusive software.Example includes computer virus, compacted Worm, Trojan Horse extort software, spyware, ad ware, threatening software etc..Extorting software is a kind of Malware, It threatens and removes non-pay ransom money, otherwise announce the data of victim or prevent to access the data.Some softwares of extorting can lock quilt The system of attack.It for example, the file of victim can be encrypted by extorting software, access it can not.Some softwares of extorting can make Lure that the wooden horse of user's downloading and the legitimate files opened carries out into disguising oneself as.Other are extorted software and can pass between the computers It is defeated, without user's interaction.In some instances, Malware (for example extorting software) can be attempted using where with Malware The associated interface of computing system, pass through associated with the computing system driver of scanning and interface, write-in or modification driving Device etc., to propagate its own.
Therefore, this document describes a kind of unknowable approach of OS, help to detect the OS from firmware and platform attack.? In one example, Honeypot Techniques are can be used to help to detect malice in management processor (such as baseboard management controller (BMC)) Software.The in-line memory or emulation memory of accessible BMC can be provided to operating system.BMC can be based on honey jar The instruction that there is Malware on the computing device is deposited in technology determination.Safe action can be implemented in response to the instruction.
In this example, no agent monitors and alarm approach are provided, for detected using firmware calculate equipment (such as Server platform) on Malware (for example extorting software) class attack.Can to OS provide such as flash memory (for example, NAND subregion, Safe digital card etc.), physics in-line memory or the emulation disk storage from BMC such as hard disk drive.Moreover, storage Device can be accessed by BMC.Memory can be configured as point looked like with bootstrap block (for example, MBR) and additional data Area is to simulate the production driver of OS.
BMC can monitor the Malware of memory or extort software exercise or mode.If it find that sort of activity, to There are potential threats for BMC instruction.In one example, it any write-in activity in the time window of memory or is continuously written into Activity can be considered as activity or mode, because driver should not be manipulated.In other examples, collapse, encrypt or other Mode can indicate activity or mode.Moreover, in some instances, activity or mode can be based on because of malware attacks approach The approach that known one or more kits use.For example, the access and/or modification to bootstrap block can produce by Anomalous event caused by BMC.It is dynamic that anomalous event can trigger the safety for sending center management system (CMS) for the anomalous event Make.Anomalous event may include additional information, such as log associated with activity, OS log, system log etc..Moreover, different Ordinary affair part notice may include the analysis completed by BMC.
In addition, in some instances, the safe action of BMC may include uninfluenced dynamic after verifying system mode Make.Such safe action may include system is isolated, each interface of closing system and/or system, backup audit Log etc..The process for sending anomalous event to CMS can permit the authenticity and integrity of verifying event.
In another example, it can be used using the another way of firmware and detect Malware.In this example, Firmware interface (such as unified Extensible Firmware Interface (UEFI) application or other lightweights are bootable reflects can be used in tool Picture) Lai Shixian security diagnostics.It can according to need or the observation state based on computing system is (for example, duplicate cyclic breakdown Or fail to start the failure of main OS) Lai Zhihang security diagnostics application.In one example, in the threshold value of continuously guidance turkey Later, can by firmware interface using the mark being arranged by BMC come calls tool.In another example, instruction can be used The manual user of Malware inputs or console log diagnosis carrys out trigger flag.The tool can have the ability to check storage driving Device, such as detection MBR encryption, the encryption data in boot partition, the particular signature in lookup driver or mode etc., with detection Malware on memory driver extorts software or other advanced attack signatures.
In some instances, boot partition is the memory comprising bootstrap loader (software for being intended to guide OS) In subregion.In some instances, boot partition may include MBR.The tool diagnostic result can be sent to BMC and/or CMS (for example, via BMC).
In some instances, BMC can make after repeating guidance turkey or based on other configurations rule or strategy Software or other malware messages are extorted with pattern match and/or abnormality detection come automatic analysis console log.Response In detecting that Malware, CMS can coordinate the system and/or be communicably coupled to the recovery of the other systems of computing system.
Fig. 1 is to be able to respond according to exemplary in determining the instruction for depositing Malware on the computing device and with high safety The block diagram of the calculating equipment of movement.Calculating equipment 100 includes firmware engines 110, and firmware engines 110 may include can be by processor Or BMC112 and firmware, operating system 116, memory driver 118, processing element 130 and memory that processing element executes 132。
Fig. 2 is implemented including being able to respond in the determining instruction for depositing Malware on the computing device according to exemplary The block diagram of the computing system of the calculating equipment of safe action.System 200 may include calculating equipment 100 and other equipment 240a-240n, equipment 240a-240n are joined together and are connected to center management system via management network 220 260.In one example, CMS may include recovery engine 262.The input/output interface 234 for calculating equipment 100 can be used for Such as it is communicated via network 250 with other equipment.Input/output interface 234 can be also used for realizing other input/output, example Such as store function (for example, accessing one or more storage arrays).
Although not refining to help to simplify explanation, it can be used for equipment for the function that equipment 100 describes is calculated 240a-240n.Moreover, equipment 240 may be coupled to one or more networks except management network 220.
As described above, firmware engines 110 can be used to monitor the Malware for calculating equipment 100.Firmware engines 110 can To be implemented as the firmware instructions executed at least one processor or physical treatment element.In some instances, processor It can be the main processing element 130 for calculating equipment 100.In other examples, individual processor can be used.Firmware engines 110 be determined for calculate equipment 100 on there are the instructions of Malware.In response to determining that the instruction of Malware exists, Safe action can be implemented.
In one example, BMC112 is used for determining to deposit the instruction of Malware on computing device 100.It can make BMC112 is realized with the processor isolated with for executing the processing element 130 of high level operating system 116.BMC112 is to calculate Equipment provides so-called " light-off " function.Light-off function can permit user (such as system manager) calculate equipment 100, Implement management operation on 240, even if not installing on the computing device or not operating operating system.In addition, in one example, BMC112 can be run under accessory power supply, therefore calculated equipment 100,240 and do not needed to be energized to open state, in the unlatching Under state, the control for calculating equipment 100,240 is handed over to operating system 116 after powering.As an example, BMC112 can be mentioned For so-called " band is outer " service, such as the healthy shape of remote console access, remote reboot and power management function, monitoring system Condition, access system log etc..As used herein, BMC112 has the management energy for calculating the subsystem of equipment 100,240 Power, and processor or processing element 130 with the master operating system for executing calculating equipment (for example, server or server set) Separation.
As described above, in some cases, BMC112 can enable the light-off management for calculating equipment 100, provide remote Whether thread management accesses (for example, system control position access), be powered but regardless of calculating equipment 100, major networks subsystem hardware Whether operating or whether OS116 is currently running or has even installed.BMC112 may include that administrator can use Come and the interface of BMC112 telecommunication (such as network interface) and/or serial line interface.As used herein, service is " outside band " Via the service that dedicated management channel (for example, network interface or serial line interface) is provided by BMC112, and no matter calculate equipment Whether 100 be all available in energized state.
In some instances, BMC112 can be used as the part of shell and be included.In other examples, BMC112 can be by Include in one or more servers (for example, part of the management subsystem as server) or via interface (for example, Peripheral interface) connection.In some instances, sensor associated with BMC112 can measure internal physical variable, such as wet Degree, temperature, supply voltage, messaging parameter, fan speed, operation system function etc..BMC112 can also restart or loop start Equipment.
Operating system 116 is management computer hardware and software resource and provides the system of public service for computer program Software.OS116 can be executed on processing element 130 and is loaded into memory 132.OS116 is advanced OS116, such as (boot firmware for calculating equipment 100 will for LINUX, WINDOWS, UNIX, bare machine management program or other similar high-level software The control for calculating equipment 100 is given to it).
Memory driver 118 can be hardware storage device or be emulated by BMC112.OS116 is provided to memory driver 118 access.In one example, memory driver 118 can be connected to processing element 130 by bus, the processing element 130 Memory driver 118 can be supplied to OS116.In some instances, memory driver 118 may include multiple subregions.Example Such as, a subregion may include the firmware 114 that can be performed, such as the firmware intelligently supplied for calculating equipment 100.? In other examples, such as hard disk drive, solid state drive, nand flash memory, SD flash memory etc. is can be used in memory driver 118 One of various technologies are realized.Hardware store driver can also for example via one or more buses, controller and connect Mouth can access BMC112.
In another example, BMC112 can provide the memory driver 118 of emulation to OS116.In this way, showing at one In example, memory driver 118 can be provided as virtual drive.Various current approach can be used to provide such emulation Or virtual drive.For example, BMC112 can be via the storage of one or more buses or interface simulation to processing element 130 Equipment interface.It is, for example, possible to use input and output (I/O) controllers as interface, south bridge, super I/O chipset etc..At one In example, storage equipment can be via the simulated connection of peripheral component interconnection (PCI) PCI-X, PCIe.In another example, Another interface can be used, for example, can emulate and provide universal serial bus (USB) storage equipment.In one example, The USB storage device of emulation can be provided to via processing element 130 and I/O controller (for example, via pci bus) OS116.In some instances, the storage equipment of emulation simplifies supply, to seem that it has than actually available capacity Bigger capacity.In other examples, it can be made to go out in some way with the storage equipment metadata provided together of emulation It is existing, even if actual information may not be true.In some instances, random data pattern or actual file can be used.? In some examples, device customizing random data pattern can be calculated for individual.It is, for example, possible to use sequence numbers or unique key to come Generate one or more random data patterns.
In one example, service operating system (OS) or supply engine of the equipment initial guide into factory will calculated When middle, unique private key and public key are generated and will be on its " viscous " to system by being saved in BMC memory.The storage can be with It is lasting, and not alternatively.BMC, which can permit, accesses key using Application Programming Interface.These values can be written into and BMC In write-once register on identical specific integrated circuit (ASIC).Write-once register can be for example using fuse It realizes.In one example, private key executes algorithm by using stochastic source to create and be programmed.In another example, Public key is the cryptographic Hash of private key.In some instances, once being programmed, disabling changes the ability of register (for example, for example existing Fusible link is cut off in write line).Can based on calculate the associated sequence number of equipment or unique key come using being used for The random algorithm for generating data.Therefore, attacker may be more difficult to identification memory driver 118 and just serve as honey jar.
Memory driver 118 may be implemented as honey jar.Honey jar includes the number for looking like the legal part for calculating equipment According to, but be actually isolated and monitored by firmware engines 110 (for example, BMC112).As described, memory driver 118 can be by reality Now simulate to the valuable information of attacker or resource.In one example, memory driver 118 may include indicating guidance The analog information of block (such as MBR).Other data can be modeled expression to attack medium (such as OS, video file, data Library, picture file) valuable resource and/or information.In some instances, the data of simulation can be based on particular malware Or the particular attack medium (and can be abstract) of kit.In addition, in the various examples, can similarly be deposited multiple Storage driver is supplied to the OS116 for indicating the different honey jars for Malware.
BMC112 can monitor memory driver 118.As described above, memory driver 118 can be visited by operating system 116 It asks and can also be monitored by BMC112.BMC112 can determine the instruction that there is Malware on computing device 100.Monitoring It may include the changes, modifications or other activities tracked on memory driver 118.Monitoring can be periodically, or can be with It is realized using interruption system.For example, BMC112 is known that storage if BMC112 is emulating memory driver 118 When driver 118 is accessed.Change because memory driver 118 is not intended to implementation, the vast resources from BMC112 It does not need to be exclusively used in realizing the approach.
As used herein, Malware instruction indicate BMC112 suspect for some reason Malware there may be In in calculating equipment.In one example, this can rule or standard based on satisfaction.Various technologies can be used, for example, making With security information and incident management (SIEM) mechanism, pattern match, malware signature detection, regular expression etc..At one In example, if the data of memory driver 118 are modified or attempted to modify, there are the fingers of Malware Show.In another example, the scanning of the data in certain activities, such as memory driver 118 can trigger Malware Instruction.In some instances, which can be more wider than the range of practical confirmation Malware on the computing device.
In one example, Malware is to extort software.Extorting software is a kind of Malware, is threatened except non-pay Otherwise ransom money announces the data of victim or prevents to access the data.The message for extorting software may be can cause to extort it is soft The part of the signature of the instruction of part.Moreover, the encryption or attempt encryption of the data on memory driver 118 can be considered as extorting The instruction of software.
As described, BMC112 can monitor the Malware of memory or extort software exercise, mode or signature.If hair Existing such activity, then to BMC112 instruction, there are potential threat or Malware indicators.Moreover, in some instances, it is living Dynamic or mode can be based on the approach used by the known one or more kits of malware attacks approach.In this way, The activity detected on memory driver 118 according to mode can lead to exist on the computing device Malware and (for example strangle Rope software) instruction.In one example, which may include the modification to the boot partition (such as MBR) of simulation.
In response to calculating the instruction of the Malware in equipment 100, safe action is can be implemented in BMC112.In an example In, safe action includes that will calculate equipment 100 to be isolated with the other equipment for being communicably coupled to calculate equipment 100.This can example One or more input/output interfaces 234 are such as accessed or closed by limitation to realize.In one example, BMC112 can also To be placed under the safe mode of raising, such as do not ring in the case where specific (for example, enhancing or multifactor) certification It answers or allows to communicate.The safe mode of raising may include function restriction, and may need specific security permission.Some In example, it can will calculate equipment 100 and close that (for example, wherein OS116 not running, but BMC112 is in activity to secondary status State) or closed state.
In other examples, safe action may include checking the firmware calculated in equipment 100 or being reverted to it Preceding state.In addition, in another example, safe action may include sending CMS260 associated with equipment 100 is calculated Information.The information may include various information, for example, for determine the log information of activity or mode found, action message, OS log, system log, analysis associated with the identification of indicator etc..In some instances, BMC112 can be with CMS260 Communication, due to specific security permission associated with CMS260 Service Ticket, the CMS260 has in the safe mode of raising There is the Service Ticket of access BMC112.
In another example, another firmware engines 110 can detecte the instruction of Malware.For example, such as malice The tool of software diagnosis firmware 214 may be implemented as firmware interface, such as unified Extensible Firmware Interface (UEFI) application Or other lightweight bootable images are to realize security diagnostics.It can according to need or based on the observation state for calculating equipment 100 (for example, duplicate cyclic breakdown or fail to start the failure of main OS116) Lai Zhihang security diagnostics application.In an example In, after the continuously threshold value of guidance turkey, work can be called using the mark being arranged by BMC112 by firmware interface Tool.In another example, manual user input or the console log diagnosis of instruction Malware can be used to trigger mark Will.
Malware diagnosis firmware 214 can have the ability to check memory driver, for example, detection MBR encryption, boot partition In encryption data, search particular signature or mode etc. in driver, to detect the Malware on memory driver, extort Software or other advanced attack signatures.The information of such as diagnostic result and/or log information can be sent to by the tool BMC112 and/or CMS260 (for example, via BMC).In some instances, BMC112 can be after repeating guidance turkey Or based on other configurations rule or strategy, use pattern matching and/or abnormality detection carry out extorting for automatic analysis console log Software or other malware messages.
In response to detecting that Malware, CMS260 can verify the presence of Malware and coordinate system and/or lead to It is coupled to the recovery of the other systems of computing system in letter ground.In one example, CMS260 can be received from BMC112 about latent In the information of Malware.The information can be handled by CMS260 with verify calculate equipment 100 on there are Malware or really Surely Malware is not present.The information may include the initial data of such as log information and in firmware engines 110 One Malware diagnostic result.
If Malware is not present, data can be continued with by calculating equipment 100, or if is handled or communicated Through it is disabled, be isolated or control, then restore the normal operation for calculating equipment 100.If it is determined that there are Malware, then it can be real Recovery engine 262 is applied to start recovery process.Recovery process may include restoring to calculate the configuration setting of equipment 100 and counting It calculates and new OS is installed in equipment 100.In some instances, recovery process can also include that confirmation firmware is not potentially exposed to Malware and/or again refreshing and the one or more firmwares of recovery.
In one example, it is possible to implement security recovery agreement allows to restore automatically using embedded BMC and CMS260 Server OS and other platform assets.CMS260 can have the function that recovery policy is given to BMC112, which includes The movement that should be taken when detecting that firmware or operating system are attacked.As the part of recovery management, the identity of CMS260 can be with It is stored in the security partitioning calculated in equipment, to allow the communication with CMS260 when detecting violation.This can be use In the part for the Service Ticket for allowing the certification communication between BMC112 and CMS260.
The backup of configuration including calculating equipment 100 in each of firmware, the setting of IO card etc. can be safely stored For being used together with CMS260 with the identity/certificate for calculating equipment 100, to verify the violation alarm of signature and also extensive Multiple stage use, which is mutually authenticated, safely to be communicated.In one example, when BMC112 is configured with the recovery policy from CMS260 When, when detecting violation by automatically into the internal schema of safety, which only allows using being mutually authenticated BMC112 The highest weight of (it uses the voucher/identity being stored in security partitioning) limits the use of family (security recovery permission) and is communicated.
In the various examples, CMS260 also supports following strategy: such as server isolation, platform forensics analysis and using peace The baseline or the automatic recovery configuring of external security image library, firmware and OS being stored in CMS260 entirely.Isolation movement can relate to And it is configured to only allow to have the user of security recovery permission to log in BMC112, disables all unsafe services, takes OS Network and I/O port etc. are closed in dump (in the case where the firmware attack with effective OS).Recovery engine 262 is being based on coming from The signature alarm of the calculating equipment 100 of management and when detecting violation, using the strategy of configuration, (it uses the OS restored in baseline The snapshot of image) coordinate recovery process.In some instances, the height comprising installing using BMC virtual medium interface can be used Grade, which is repaired with the image of reimaging software, starts recovery process.The image of the reparation and reimaging may include software, To check the listings data of last time guidance, and internal or external safety database is used, identification and the one or more disks of reduction Image and application specific data on driver.
In some instances, in order to restore, one or more nonvolatile memories can be returned into " factory " condition (for example, erasing, write-in particular value etc.) is to eliminate crash issue and to eliminate incorrect behavior.Firmware operation can be used for wiping Nonvolatile memory is removed or reprogramed (for example, Serial Peripheral Interface (SPI) (SPI) component, the read-only storage of electrically erasable Device (EEPROM) etc.).
In one example, in response to the signal, BMC112 will be for example by real to the multiple components for capableing of erasing-programming It applies rudimentary simple erasing and sets recovery state for computing system.Firmware can be intelligently set, allow firmware from Recovery state is restored, as further described herein.Basic status is set by firmware and provides such reset schemes, this is multiple Position scheme can be than still having the reset schemes of collapse value more easily from its recovery in wherein component.It then can be from baseline Image (for example, storage on the computing device or the baseline in memory associated with recovery engine 262) recovery configuring is set It sets.
The example for the firmware engines 110 that can be resumed includes baseboard management controller (BMC), input and output controller (I/O controller), south bridge, super I/O, platform firmware controller etc..
In some instances, BMC112 can automatically implement one or more in the case where the management not from CMS A recovery action.In other examples, BMC112 such as described send to CMS260 communicates, and CMS260 can coordinate to restore. In some instances, BMC112 can automatically implement some safety/recovery actions, and other coordinate via CMS260.
As mentioned, each equipment 100,240a-240n may include the BMC of such as BMC112, and equipment is by being somebody's turn to do BMC112 is communicated via management network 220 with CMS260.In some instances, management network 220 can be the external world (for example, right In production network it is available or via internet) dedicated network that cannot access.In other examples, connection (example can be provided Such as, via firewall) arrive another network environment.CMS260 (its own may include computer) provides the management for being used for equipment The control point of purpose.In some instances, CMS260 may be implemented as such as calculate equipment 100, equipment 240, server, The virtual machine executed in the equipment of work station etc..In one example, CMS260, which can be used by a person, comes manually (or via foot This) operating system is loaded into equipment, enable and disable various server features etc..
Data connection between 100,240 and CMS260 of equipment forms local area network (LAN), and the local area network is according to various examples It mainly or is exclusively used for system administration purpose, that is, is not used in and handles data according to the principle function of equipment.Therefore, it manages Network 220 is generally not used in processing data trade.The function of CMS260 first is that use recovery engine 262 coordinate one or more The recovery of a system.
In some examples, it calculates equipment 100 and equipment 240 may be implemented as computer, such as server.At other In example, equipment may include special purpose machinery.Calculate equipment 100, equipment 240 and/or CMS260 can via processing element, deposit Reservoir and/or other assemblies are realized.
Wire communication, wireless communication or combinations thereof can be used in communication network 220,250.Moreover, communication network 220,250 It may include multiple sub- communication networks, such as data network, wireless network, telephone network etc..Such network may include For example, public data network, such as internet, local area network (LAN), wide area network (WAN), Metropolitan Area Network (MAN) (MAN), cable network, light Fibre web network, their combination etc..In some examples, wireless network may include cellular network, satellite communication, Wireless LAN etc.. Moreover, communication network 220,250 can be the form of the straight-forward network link between equipment.Can use various communication structures and Infrastructure realizes communication network.
For example, equipment via communication protocol or multiple agreements with each other and with Internet access communication network other Assembly communication.Agreement, which can be, defines the one group of the rule how node of respective communication network interacts with other nodes.Moreover, net Communication between network node can be by exchanging discrete data packet or sending the message to realize.Packet may include related to agreement The header information (for example, information of the position about the network node to be contacted) and net load information of connection.
Processing element 130 can be one or more central processing elements (CPU), one or more based on the micro- of semiconductor Processor, one or more graphics processing unit (GPU), suitable for the finger being stored in machine readable storage medium is retrieved and executed Other hardware devices or combinations thereof enabled.Processing element 130 can be physical equipment.In addition, in one example, processing element 130 may include the multiple cores on chip, including across multiple chips multiple cores, across the multiple cores of multiple equipment (for example, if calculating equipment 100 includes multiple node devices) or combinations thereof.Processing element 130 can be extracted, decodes and be executed Instruction.As substitution or other than instruction is retrieved and executed, processing element 130 may include at least one integrated circuit (IC), other control logics, other electronic circuits or combinations thereof comprising for implementing several electronics groups of the function of instruction Part.
For example the engine of firmware engines 110 and recovery engine 262 includes the combination of hardware and/or hardware and programming to implement Function provided herein.Another engine can be used also to realize in the function of belonging to particular engine.In some instances, engine Processing element can be used and instruct and/or use specific integrated circuit (ASIC) Lai Shixian.
As described, in addition input/output interface 234 can be provided by calculating equipment 100.For example, can use such as key Disk, sensor, touch interface, mouse, microphone etc. input equipment receive from the defeated of the environment calculated around equipment 100 Enter.Moreover, in some instances, the output equipment that can use such as display provides a user information.Output equipment shows Example includes loudspeaker, display equipment, amplifier etc..In addition, in some examples, can use some components to realize this paper institute The function for the other assemblies stated.For example the input-output apparatus of communication equipment (such as network communication equipment or wireless device) can also To be considered as the equipment for being able to use input/output interface 234.Similarly, storage equipment (such as array) can be used through By the communication of input/output interface 234.Equipment 100 is calculated for example, storage area network can be connected to, or can be through One or more memory drivers are connected by input/output interface 234.
In the various examples, CMS260 can provide additional function.For example, CMS260 can provide big rule in a device Mould point and update firmware, operating system, the ability and/or other abilities of driver, software.CMS260 can be can manage The licensing of equipment in data center.In addition, CMS260 is can be found that and the equipment managed on network 220 of making an inventory.CMS260 It can be can support both online and offline firmware and driver update.In some instances, batch can be carried out in order It updates.
In one example, CMS260 can make an inventory the configuration setting about equipment, firmware level, software information etc..Disk Point inventory can be stored in the memory for being coupled to CMS260.In addition, memory may include that can be used for restoring corresponding The firmware/software image of the tool of equipment.
Fig. 3 is the flow chart of the method for movement with high safety according to the exemplary instruction in response to Malware. Fig. 4 be according to it is exemplary include the meter for being able to respond the baseboard management controller of instruction in Malware and movement with high safety Calculate the block diagram of equipment.
Although describing the execution of method 300 referring to equipment 400 is calculated, it is available with for executing method 300 other suitable components (for example, using the calculating equipment 100 of BMC112).Method 300 can be to be stored in tangible machine It the form of executable instruction on readable storage medium storing program for executing (such as storage medium 420) and/or is realized in the form of electronic circuit.
The high-level software of such as operating system can be run as machine readable storage medium and processing elements by calculating equipment 400 Instruction on part (not shown).The processing element that separates of processing element with OS is executed can be used to realize in BMC 410.Such as This, BMC 410 is realized using individual controller.As described above, BMC 410 can also be provided outside band to calculate equipment 400 Service.In one example, it can be provided by executing service order 422 with outer service.
At 302, the memory driver that can be monitored by BMC 410 can be provided to OS by calculating equipment.Central processing member Part (for example, central processing unit (CPU)) can be provided the access right to memory driver.Moreover, BMC 410 can be mentioned For the access right to memory driver.As described above, in one example, memory driver may include the physics of such as flash memory Medium, and in another example, memory driver can be embodied as that BMC 410 provides by BMC 410 with one of outer service Part.In this way, in one example, BMC 410 can execute service order 422 using by memory driver as virtual or emulation Driver be supplied to OS.In addition, as described above, memory driver may include simulation boot sector (e.g., including MBR Data) and be modeled to appear to one or more Malwares or extort the valuable data of software attacks medium Other data.In some instances, because of 410 Internet access memory driver of BMC, when new attack medium occurs When, BMC 410 can update storage driver to appear to have value to new attack medium.
At 304, BMC 410 can execute monitoring instruction 424 and serve as the honey jar indicated for Malware to monitor Memory driver.Based on the activity detected at memory driver, BMC 410 can determine there is malice while monitoring The instruction of software exists.Malware can indicate to extort software or other constant threats.The activity detected can be by BMC The part of 410 modes detected on memory driver or signature.In one example, which, which can be, indicates potential evil The instruction that rule existing for meaning software, standard, mode or signature are hit.As described above, the instruction may include driving to storage Modification is attempted in the modification of a part (for example, MBR data of simulation) of dynamic device.
In response to the instruction, at 306, BMC 410 can execute safety command 426 to indicate to come in response to Malware Property movement with high safety.As described above, safe action may include for example by close calculate equipment 400 multiple interfaces come every From calculating equipment 400.Moreover, safe action may include notifying the instruction to CMS via management network.In addition, showing some In example, safe action may include the firmware condition for checking the calculating equipment compared with Hash, and if firmware is damaged Evil then restores firmware (for example, refreshing again).In some instances, the recovery or isolation of one or more components can respond In from CMS receive communication and occur.Instruction and information associated with potential Malware can be sent to CMS.The letter Breath may include the analysis of BMC 410 or other firmwares, about detecting the activity or information of mode etc. for causing instruction.As above Described, BMC 410 can enter the safe mode for needing the permission (for example, via Permission Levels are authenticated to) of specific rank.With The communication of CMS can be authenticated to the Permission Levels.
BMC410 can be suitable for one that the instruction being stored in machine readable storage medium 420 is retrieved and executed or Multiple processors, microcontroller or other hardware devices or combinations thereof.BMC 410 can be physical equipment.In addition, showing at one In example, BMC 410 can be extracted, be decoded and execute instruction 422,424,426 with implementation method 300.As substitution or in addition to inspection Rope and except executing instruction, BMC 410 may include at least one integrated circuit (IC), other control logics, other electronics electricity Road or combinations thereof comprising for implementing several electronic building bricks of the function of instruction 422,424,426.
Machine readable storage medium 420 can be include or storage any electronics of executable instruction, magnetism, optics or its His physical storage device.Therefore, machine readable storage medium can be, for example, random access memory (RAM), electric erasable Programmable read only memory (EEPROM), memory driver, compact disc read-only memory (CD-ROM) etc..In this way, machine readable deposit Storage media can be non-transitory.As described in detail herein, in one example, machine readable storage medium 420 can be with With a series of executable instructions coding for realizing method 300.
Fig. 5 is to extort the firmware instruction that software is present in system based on confirmation to start recovery process according to exemplary The flow chart of method.Fig. 6 is can to indicate that starting restored on a computing system based on the firmware for extorting software according to exemplary The block diagram of the center management system of journey.
Method 500 can start at 502, and wherein CMS 600 receives the letter of the instruction about Malware from BMC 650 Breath.The information may include log information, for example, about activity or trial at the storage equipment that BMC 650 is being monitored Activity collected by information.Communication with BMC 650 can be certified.Communication instruction 622 can be executed by processing element 610 To realize certified communication.Moreover, CMS600 can have the permission communicated with the BMC650 in the security level promoted Rank, the specific authentication grade that the security level of the promotion needs the communication of the certification for example via exchange token or voucher to meet Not.
At 504, processing element 610 can execute analysis instruction 624 to determine whether there is according to the received information of institute Malware (for example, extorting software).Analysis may include using the verifying of SIEM or other safety analysis approach, such as mode Detection, signature detection etc..In one example, log can show the instruction be by calculating equipment defragmentation algorithms without It is caused by activity caused by Malware.In another example, log can show that the instruction is by rogue activity institute It is caused.
In response to verifying, at 506, recovery instruction 626 can be executed in calculating equipment associated with BMC 650 Start recovery process.CMS 600 can coordinate to calculate the recovery of equipment.Recovery may include restoring to calculate the configuration setting of equipment And new operating system is installed on the computing device.New operating system can be by being supplied to calculating equipment via BMC650 Virtual medium interface install.In some instances, which may include that verifying calculates the firmware in equipment or will consolidate Part flushes to controlled baseline level again.Baseline restorer configuration setting can for calculate equipment locating for environment rather than The basic firmware of equipment is calculated to customize.In addition, installing new operating system on baseline firmware can provide securely and reliably Operating environment.This is particularly useful in the data center, easily can replace and supply clustered machine and use in data center User data is stored separately on memory (such as using storage array).
As described above, CMS 600 may be implemented as calculating the virtual machine in equipment.In other examples, CMS 600 can To be implemented as individually calculating the part of equipment or multiple machines.
Processing element 610 can be one or more central processing unit (CPU), one or more based on the micro- of semiconductor Processor, one or more graphics processing units (GPU) are stored in machine readable storage medium 620 suitable for being retrieved and executed In instruction other hardware devices, or combinations thereof.Processing element 610 can be physical equipment.In addition, in one example, Processing element 610 may include the multiple cores on chip, including across multiple chips multiple cores, across multiple equipment Multiple cores (for example, if CMS600 includes multiple node devices) or combinations thereof.Processing element 610 can be extracted, be decoded simultaneously 622,624,626 are executed instruction with implementation method 500.As substitution or other than instruction is retrieved and executed, processing element 610 may include at least one integrated circuit (IC), other control logics, other electronic circuits or combinations thereof comprising be used for Execute instruction several electronic building bricks of 622,624,626 function.
Machine readable storage medium 620 can be include or storage any electronics of executable instruction, magnetism, optics or its His physical storage device.Therefore, machine readable storage medium can be, for example, random access memory (RAM), electric erasable Programmable read only memory (EEPROM), memory driver, compact disc read-only memory (CD-ROM) etc..In this way, machine readable deposit Storage media can be non-transitory.As described in detail herein, machine readable storage medium 620 can be with for realizing method A series of 500 executable instructions coding.
Although certain embodiments have been shown and described above, can carry out in form and details various changes Become.For example, some features about an embodiment and/or process description can be associated with other embodiments. In other words, process, feature, component and/or the property about the description of an embodiment can be used for other embodiments.This Outside, it should be appreciated that system and method described herein may include the component and/or feature of described different embodiments Various combinations and/or sub-portfolio.Therefore, referring to the feature of one or more embodiments descriptions can with it is described herein other Embodiment combination.

Claims (20)

1. a kind of computing system, comprising:
Equipment is calculated, the calculating equipment includes:
At least one processing element;
Memory;
Firmware engines, the firmware engines include:
The baseboard management controller (BMC) separated at least one described processing element, the baseboard management controller (BMC) are The calculating equipment provides at least one with outer service;
The firmware executed at least one described processing element during guidance,
Wherein at least one of described firmware engines are wanted:
Determine that there are the instruction of Malware presence in the calculating equipment;And
In response to there are the instructions of the Malware to carry out movement with high safety in the calculating equipment.
2. computing system as described in claim 1, wherein the BMC is further wanted:
Monitor the memory driver that the operating system that executes at least one described processing element can access, by determination it is described in terms of There are the instruction of Malware presence in calculation equipment.
3. computing system as claimed in claim 2, wherein the memory driver is to be supplied to the operation system by the BMC The virtual drive of system.
4. computing system as claimed in claim 2, wherein the memory driver includes the BMC and the operating system energy The flash memories of access.
5. computing system as described in claim 1, wherein the memory driver includes simulation main boot partition data and refers to Show other data of operating system.
6. computing system as claimed in claim 5, wherein the Malware includes extorting software, and wherein according to mode The activity detected on the driver leads to there is the instruction for extorting software in the calculating equipment.
7. computing system as claimed in claim 6, wherein the mode includes the modification to the boot partition data.
8. computing system as claimed in claim 7, wherein the safe action includes by the calculating equipment and communicatedly coupling Close the multiple other equipment isolation for calculating equipment.
9. computing system as described in claim 1, further comprises:
Center management system,
Wherein the BMC is sent and Malware presence via the communication of certification to the center management system (CMS) Indicate associated log information,
Wherein the CMS is wanted:
It verifies the log information and indicates that the Malware exists;And
Start recovery process, the recovery process includes restoring the configuration setting for calculating equipment and in the calculating equipment The new operating system of upper installation.
10. computing system as claimed in claim 9, wherein the safe action includes safe mode of the BMC to improve It is communicated, the safe mode of the raising has the restricted function for needing particular safety permission, wherein the communication of the certification Use the particular safety permission.
11. computing system as claimed in claim 9, wherein executed at least one described processing element during guidance The firmware is further wanted:
Determine that the instruction of the Malware exists from the mode of guidance failure;
Malware is started to diagnose to determine Malware diagnostic result;And
The Malware diagnostic result is sent to the BMC,
Wherein the BMC further sends the CMS for the Malware diagnostic result via the communication of the certification, and And
Wherein the verifying of the log information is based further on the Malware diagnostic result.
12. a kind of non-transitory machinable medium of store instruction, if calculating the baseboard management controller of equipment (BMC) described instruction is executed, then described instruction leads to the BMC:
At least one is provided with outer service for the calculating equipment;
The operating system executed on the central processing element of the separation of BMC described in Xiang Yu provides memory driver;
Monitoring serve as the memory driver of honey jar with based on the activity detected at the memory driver to determine State calculate equipment on there are the instructions of Malware;And
In response to there is the instruction of the Malware, movement with high safety on said computing device.
13. non-transitory machinable medium as claimed in claim 12, wherein the memory driver is by described BMC is supplied to the virtual drive of the operating system.
14. non-transitory machinable medium as claimed in claim 13, wherein the memory driver includes simulation Master boot record data and other data.
15. non-transitory machinable medium as claimed in claim 14, wherein the Malware is soft including extorting Part, and the activity that wherein detects on the memory driver is associated with mode and causes in the calculating equipment There are the instructions for extorting software, wherein the mode includes the modification to the simulation master boot record data.
16. non-transitory machinable medium as claimed in claim 12, wherein the safe action includes passing through pass The multiple interfaces for calculating equipment are closed the calculating equipment is isolated.
17. a kind of method, comprising:
At least one is provided with outer service by baseboard management controller (BMC) to calculate equipment,
Wherein the BMC is separated with central processing element, and the central processing element executes the operating system for calculating equipment;
Equipment is stored by the honey jar that BMC monitoring is supplied to the operating system, wherein honey jar storage equipment includes Simulate master boot record and other data;
Based on the monitoring, determine that instruction is deposited in the presence of the activity pattern for extorting software on said computing device by the BMC ?;And
Indicate that the activity pattern for extorting software is present in the calculating equipment in response to determining, it is with high safety by the BMC Movement.
18. method as claimed in claim 17, further comprises:
As the part of the safe action, the calculating equipment is isolated by the BMC.
19. method as claimed in claim 17, further comprises:
Day associated with the activity pattern is sent to center management system (CMS) via the communication of certification by the BMC Will information,
Wherein, the part as the safe action promotes the BMC to the certification grade for needing the communication of the certification to meet Other security level;
Determine that extorting software described in the log information instruction exists by the CMS;And
By the CMS start recovery process, the recovery process include restore it is described calculate equipment configuration setting and via The virtual medium provided by the BMC installs new operating system on said computing device.
20. method as claimed in claim 17, wherein the mode includes the modification to the simulation master boot record data.
CN201810035877.2A 2017-11-20 2018-01-15 Method and non-transitory machine-readable storage medium for performing security actions Active CN109815698B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/817,638 2017-11-20
US15/817,638 US10956575B2 (en) 2017-11-20 2017-11-20 Determine malware using firmware

Publications (2)

Publication Number Publication Date
CN109815698A true CN109815698A (en) 2019-05-28
CN109815698B CN109815698B (en) 2023-10-31

Family

ID=60972107

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810035877.2A Active CN109815698B (en) 2017-11-20 2018-01-15 Method and non-transitory machine-readable storage medium for performing security actions

Country Status (3)

Country Link
US (1) US10956575B2 (en)
EP (1) EP3486824B1 (en)
CN (1) CN109815698B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021028740A1 (en) * 2019-08-13 2021-02-18 International Business Machines Corporation Automatic ransomware detection with an on-demand file system lock down and automatic repair function
US11328064B2 (en) 2019-08-13 2022-05-10 International Business Machines Corporation Automatic ransomware detection with an on-demand file system lock down and automatic repair function

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11575688B2 (en) * 2018-05-02 2023-02-07 Sri International Method of malware characterization and prediction
US11055444B2 (en) * 2018-06-20 2021-07-06 NortonLifeLock Inc. Systems and methods for controlling access to a peripheral device
US20210019421A1 (en) * 2019-07-16 2021-01-21 Hewlett Packard Enterprise Development Lp Identifying a security vulnerability in a computer system
CN110795738B (en) * 2019-09-19 2022-05-13 超聚变数字技术有限公司 Computer starting method, controller, storage medium and system
US11652831B2 (en) 2020-04-14 2023-05-16 Hewlett Packard Enterprise Development Lp Process health information to determine whether an anomaly occurred
US11811824B2 (en) * 2020-06-08 2023-11-07 Target Brands, Inc. Security system for detecting malicious actor's observation
US11748478B2 (en) * 2020-08-07 2023-09-05 Softiron Limited Current monitor for security
US11687431B2 (en) * 2021-01-18 2023-06-27 Dell Products L.P. Determining changes to components of a computing device prior to booting to a primary environment of the computing device
US20220276876A1 (en) * 2021-03-01 2022-09-01 Softiron Limited Remote Server Management Utilizing Self Contained Baseboard Management Controller
US11336685B1 (en) * 2021-12-22 2022-05-17 Nasuni Corporation Cloud-native global file system with rapid ransomware recovery

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7725937B1 (en) * 2004-02-09 2010-05-25 Symantec Corporation Capturing a security breach
US20140373151A1 (en) * 2013-06-18 2014-12-18 Dell Products, Lp System and Method for Operating Malicious Marker Detection Software on Management Controller of Protected System
WO2016064433A1 (en) * 2014-10-24 2016-04-28 Mcafee, Inc. Agent presence for self-healing
US20160217283A1 (en) * 2015-01-26 2016-07-28 Dell Products, Lp Method for Logging Firmware Attack Event and System Therefor
US20160267275A1 (en) * 2015-03-12 2016-09-15 International Business Machines Corporation Securely booting a computer from a user trusted device
CN106030512A (en) * 2014-03-26 2016-10-12 英特尔公司 Initialization trace of a computing device
CN106599694A (en) * 2015-10-14 2017-04-26 广达电脑股份有限公司 Security protection management methods, computer systems and computer-readable storage media
CN107025406A (en) * 2016-02-01 2017-08-08 广达电脑股份有限公司 Motherboard, computer readable storage means and firmware validation method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1578082B1 (en) 2004-03-16 2007-04-18 AT&T Corp. Method and apparatus for providing mobile honeypots
US8181250B2 (en) 2008-06-30 2012-05-15 Microsoft Corporation Personalized honeypot for detecting information leaks and security breaches
US8935773B2 (en) 2009-04-09 2015-01-13 George Mason Research Foundation, Inc. Malware detector
US9317690B2 (en) 2011-03-28 2016-04-19 Mcafee, Inc. System and method for firmware based anti-malware security
US9473520B2 (en) 2013-12-17 2016-10-18 Verisign, Inc. Systems and methods for incubating malware in a virtual organization
US10708290B2 (en) 2016-01-18 2020-07-07 Secureworks Corp. System and method for prediction of future threat actions

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7725937B1 (en) * 2004-02-09 2010-05-25 Symantec Corporation Capturing a security breach
US20140373151A1 (en) * 2013-06-18 2014-12-18 Dell Products, Lp System and Method for Operating Malicious Marker Detection Software on Management Controller of Protected System
CN106030512A (en) * 2014-03-26 2016-10-12 英特尔公司 Initialization trace of a computing device
WO2016064433A1 (en) * 2014-10-24 2016-04-28 Mcafee, Inc. Agent presence for self-healing
US20160217283A1 (en) * 2015-01-26 2016-07-28 Dell Products, Lp Method for Logging Firmware Attack Event and System Therefor
US20160267275A1 (en) * 2015-03-12 2016-09-15 International Business Machines Corporation Securely booting a computer from a user trusted device
CN106599694A (en) * 2015-10-14 2017-04-26 广达电脑股份有限公司 Security protection management methods, computer systems and computer-readable storage media
CN107025406A (en) * 2016-02-01 2017-08-08 广达电脑股份有限公司 Motherboard, computer readable storage means and firmware validation method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
苏振宇;: "基于国产BMC的服务器安全启动技术研究与实现", 信息安全研究, no. 09, pages 57 - 65 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021028740A1 (en) * 2019-08-13 2021-02-18 International Business Machines Corporation Automatic ransomware detection with an on-demand file system lock down and automatic repair function
US11328064B2 (en) 2019-08-13 2022-05-10 International Business Machines Corporation Automatic ransomware detection with an on-demand file system lock down and automatic repair function
GB2601938A (en) * 2019-08-13 2022-06-15 Ibm Automatic ransomware detection with an on-demand file system lock down and automatic repair function
GB2601938B (en) * 2019-08-13 2022-12-21 Ibm Automatic ransomware detection with an on-demand file system lock down and automatic repair function
US11693963B2 (en) 2019-08-13 2023-07-04 International Business Machines Corporation Automatic ransomware detection with an on-demand file system lock down and automatic repair function

Also Published As

Publication number Publication date
US20190156039A1 (en) 2019-05-23
CN109815698B (en) 2023-10-31
US10956575B2 (en) 2021-03-23
EP3486824A1 (en) 2019-05-22
EP3486824B1 (en) 2021-09-08

Similar Documents

Publication Publication Date Title
CN109815698A (en) Malware is determined using firmware
US11176255B2 (en) Securely booting a service processor and monitoring service processor integrity
US11503030B2 (en) Service processor and system with secure booting and monitoring of service processor integrity
CN109918916B (en) Dual-system trusted computing system and method
US9087199B2 (en) System and method for providing a secured operating system execution environment
CN103299311B (en) Methods and apparatus for trusted boot optimization
CN102651061B (en) System and method of protecting computing device from malicious objects using complex infection schemes
CN102035651B (en) Computer system and method with anti-malware
KR101458780B1 (en) Providing a multi-phase lockstep integrity reporting mechanism
US9143509B2 (en) Granular assessment of device state
CN112840318A (en) Automated operation management for computer systems
Ho et al. PREC: practical root exploit containment for android devices
CN110321235B (en) System interaction method and device of trusted computing platform based on dual-system architecture
US11438349B2 (en) Systems and methods for protecting devices from malware
CN105468978A (en) Trusted computing cryptogram platform suitable for general computation platform of electric system
CN110334512B (en) Static measurement method and device of trusted computing platform based on dual-system architecture
CN105531692A (en) Security policies for loading, linking, and executing native code by mobile applications running inside of virtual machines
KR20100037016A (en) Hardware-based anti-virus scan service
CN110334521A (en) Credible accounting system construction method, device, credible accounting system and processor
CN110109710B (en) Method and system for establishing OS (operating system) trust chain without physical root of trust
CN110334522A (en) Start the method and device of measurement
US11750634B1 (en) Threat detection model development for network-based systems
KR20200041639A (en) In-vehicle software update system and method for controlling the same
CN110334509B (en) Method and device for constructing trusted computing platform of dual-system architecture
Cutler et al. Trusted disk loading in the Emulab network testbed

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant